* [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19
@ 2023-09-20 12:15 Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 52/63] virtio: Drop out of coroutine context in virtio_load() Michael Tokarev
` (11 more replies)
0 siblings, 12 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel; +Cc: qemu-stable, Michael Tokarev
The following patches are queued for QEMU stable v7.2.6:
https://gitlab.com/qemu-project/qemu/-/commits/staging-7.2
Patch freeze is 2023-09-19 (frozen), and the release is planned for 2023-09-21:
https://wiki.qemu.org/Planning/7.2
Please respond here or CC qemu-stable@nongnu.org on any additional patches
you think should (or shouldn't) be included in the release.
The changes which are staging for inclusion, with the original commit hash
from master branch, are given below the bottom line.
v3:
- pick up more fixes from master
v2:
- I decided to pick up dma/mmio reentrancy fixes from 8.1 now once
(hopefully) all issues has been addressed. This is
commit a2e1753b8054344f32cf94f31c6399a58794a380
Author: Alexander Bulekov <alxndr@bu.edu>
Date: Thu Apr 27 17:10:06 2023 -0400
memory: prevent dma-reentracy issues
with all subsequent changes, up to
76f9ebffcd41 pnv_lpc: disable reentrancy detection for lpc-hc
I haven't picked this series sooner (while had it backported
and tested for quite some time) because with time, some more
places were found where reentrancy detection has to be disabled
too (like this pnv_lpc change).
What prompted me to look at this series again: one of the ide/ahci
change had to be context-edited to apply to 7.2, and the context
was the one from this reentrancy patch series. So instead of
editing context, I decided to pick the reentrancy series and
apply subsequent changed cleanly.
- I've added 2 patches (one cherry-pick and one specific to stable-7.2)
just to fix gitlab-CI failed jobs, so CI status will not be "failed"
Thanks!
/mjt
--------------------------------------
01* b8d1fc55b5 Michael Tokarev:
gitlab-ci: check-dco.py: switch from master to stable-7.2 branch
02* 6832189fd791 John Snow:
python: drop pipenv
03* a2e1753b8054 Alexander Bulekov:
memory: prevent dma-reentracy issues
04* 9c86c97f12c0 Alexander Bulekov:
async: Add an optional reentrancy guard to the BH API
05* 7915bd06f25e Alexander Bulekov:
async: avoid use-after-free on re-entrancy guard
06* ef56ffbdd6b0 Alexander Bulekov:
checkpatch: add qemu_bh_new/aio_bh_new checks
07* f63192b0544a Alexander Bulekov:
hw: replace most qemu_bh_new calls with qemu_bh_new_guarded
08* bfd6e7ae6a72 Alexander Bulekov:
lsi53c895a: disable reentrancy detection for script RAM
09* d139fe9ad8a2 Thomas Huth:
lsi53c895a: disable reentrancy detection for MMIO region, too
10* 985c4a4e547a Alexander Bulekov:
bcm2835_property: disable reentrancy detection for iomem
11* 6dad5a6810d9 Alexander Bulekov:
raven: disable reentrancy detection for iomem
12* 50795ee051a3 Alexander Bulekov:
apic: disable reentrancy detection for apic-msi
13* 6d0589e0e6c6 Alexander Bulekov:
loongarch: mark loongarch_ipi_iocsr re-entrnacy safe
14* 76f9ebffcd41 Alexander Bulekov:
pnv_lpc: disable reentrancy detection for lpc-hc
15* a1d027be95bc Zhao Liu:
machine: Add helpers to get cores/threads per socket
16* d79a284a44bb Zhao Liu:
hw/smbios: Fix smbios_smp_sockets caculation
17* 7298fd7de555 Zhao Liu:
hw/smbios: Fix thread count in type4
18* 196ea60a734c Zhao Liu:
hw/smbios: Fix core count in type4
19* 8a64609eea8c Dongli Zhang:
dump: kdump-zlib data pages not dumped with pvtime/aarch64
20* dbdb13f931d7 Ankit Kumar:
hw/nvme: fix CRC64 for guard tag
21* 4333f0924c2f Nathan Egge:
linux-user/elfload: Set V in ELF_HWCAP for RISC-V
22* e73f27003e77 Richard Henderson:
include/exec/user: Set ABI_LLONG_ALIGNMENT to 4 for microblaze
23* ea9812d93f9c Richard Henderson:
include/exec/user: Set ABI_LLONG_ALIGNMENT to 4 for nios2
24* 6ee960823da8 Luca Bonissi:
Fixed incorrect LLONG alignment for openrisc and cris
25* 791b2b6a9302 Ilya Leoshkevich:
target/s390x: Fix the "ignored match" case in VSTRS
26* 23e87d419f34 Ilya Leoshkevich:
target/s390x: Use a 16-bit immediate in VREP
27* 6db3518ba4fc Ilya Leoshkevich:
target/s390x: Fix VSTL with a large length
28* 6a2ea6151835 Ilya Leoshkevich:
target/s390x: Check reserved bits of VFMIN/VFMAX's M5
29* d19436291013 Thomas Huth:
include/hw/virtio/virtio-gpu: Fix virtio-gpu with blob on big endian hosts
30* 5e0d65909c6f Akihiko Odaki:
kvm: Introduce kvm_arch_get_default_type hook
31* 1ab445af8cd9 Akihiko Odaki:
accel/kvm: Specify default IPA size for arm64
32* 4b3520fd93cd Richard Henderson:
target/arm: Fix SME ST1Q
33* cd1e4db73646 Richard Henderson:
target/arm: Fix 64-bit SSRA
34* 09a3fffae00b Philippe Mathieu-Daudé:
docs/about/license: Update LICENSE URL
35* f187609f27b2 Fabiano Rosas:
block-migration: Ensure we don't crash during migration cleanup
36* 6ec65b69ba17 Maksim Kostin:
hw/ppc/e500: fix broken snapshot replay
37* 7b8589d7ce7e Nicholas Piggin:
ppc/vof: Fix missed fields in VOF cleanup
38* af03aeb631ee Richard Henderson:
target/ppc: Flush inputs to zero with NJ in ppc_store_vscr
39* c3461c6264a7 Niklas Cassel:
hw/ide/core: set ERR_STAT in unsupported command completion
40* 2967dc8209dd Niklas Cassel:
hw/ide/ahci: write D2H FIS when processing NCQ command
41* e2a5d9b3d9c3 Niklas Cassel:
hw/ide/ahci: simplify and document PxCI handling
42* d73b84d0b664 Niklas Cassel:
hw/ide/ahci: PxSACT and PxCI is cleared when PxCMD.ST is cleared
43* 1a16ce64fda1 Niklas Cassel:
hw/ide/ahci: PxCI should not get cleared when ERR_STAT is set
44* 7e85cb0db4c6 Niklas Cassel:
hw/ide/ahci: fix ahci_write_fis_sdb()
45* 9f8942353765 Niklas Cassel:
hw/ide/ahci: fix broken SError handling
46* 97b8aa5ae9ff Hang Yu:
hw/i2c/aspeed: Fix Tx count and Rx size error in buffer pool mode
47* 961faf3ddbd8 Hang Yu:
hw/i2c/aspeed: Fix TXBUF transmission start position error
48* bcd8e243083c Thomas Huth:
qemu-options.hx: Rephrase the descriptions of the -hd* and -cdrom options
49* b21a6e31a182 Markus Armbruster:
docs tests: Fix use of migrate_set_parameter
50* 90a0778421ac Thomas Huth:
hw/net/vmxnet3: Fix guest-triggerable assert()
51* 95bef686e490 Marc-André Lureau:
qxl: don't assert() if device isn't yet initialized
52 92e2e6a86733 Kevin Wolf:
virtio: Drop out of coroutine context in virtio_load()
53 682814e2a3c8 Colton Lewis:
arm64: Restore trapless ptimer access
54 c255946e3df4 Thomas Huth:
hw/char/riscv_htif: Fix printing of console characters on big endian hosts
55 e0922b73baf0 Jason Chien:
hw/intc: Fix upper/lower mtime write calculation
56 9382a9eafcca Jason Chien:
hw/intc: Make rtc variable names consistent
57 ae7d4d625cab LIU Zhiwei:
linux-user/riscv: Use abi type for target_ucontext
58 9ff314063125 Conor Dooley:
hw/riscv: virt: Fix riscv,pmu DT node path
59 4e3adce1244e Leon Schuermann:
target/riscv/pmp.c: respect mseccfg.RLB for pmpaddrX changes
60 4c46fe2ed492 Stefan Berger:
hw/tpm: TIS on sysbus: Remove unsupport ppi command line option
61 48a35e12faf9 Marc-André Lureau:
ui: fix crash when there are no active_console
62 297ec01f0b98 Janosch Frank:
s390x/ap: fix missing subsystem reset registration
63 8e32ddff69b6 Marc-André Lureau:
tpm: fix crash when FD >= 1024 and unnecessary errors due to EINTR
(commit(s) marked with * were in previous series and are not resent)
^ permalink raw reply [flat|nested] 13+ messages in thread
* [Stable-7.2.6 52/63] virtio: Drop out of coroutine context in virtio_load()
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 53/63] arm64: Restore trapless ptimer access Michael Tokarev
` (10 subsequent siblings)
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel; +Cc: qemu-stable, Kevin Wolf, Stefan Hajnoczi, Michael Tokarev
From: Kevin Wolf <kwolf@redhat.com>
virtio_load() as a whole should run in coroutine context because it
reads from the migration stream and we don't want this to block.
However, it calls virtio_set_features_nocheck() and devices don't
expect their .set_features callback to run in a coroutine and therefore
call functions that may not be called in coroutine context. To fix this,
drop out of coroutine context for calling virtio_set_features_nocheck().
Without this fix, the following crash was reported:
#0 __pthread_kill_implementation (threadid=<optimized out>, signo=signo@entry=6, no_tid=no_tid@entry=0) at pthread_kill.c:44
#1 0x00007efc738c05d3 in __pthread_kill_internal (signo=6, threadid=<optimized out>) at pthread_kill.c:78
#2 0x00007efc73873d26 in __GI_raise (sig=sig@entry=6) at ../sysdeps/posix/raise.c:26
#3 0x00007efc738477f3 in __GI_abort () at abort.c:79
#4 0x00007efc7384771b in __assert_fail_base (fmt=0x7efc739dbcb8 "", assertion=assertion@entry=0x560aebfbf5cf "!qemu_in_coroutine()",
file=file@entry=0x560aebfcd2d4 "../block/graph-lock.c", line=line@entry=275, function=function@entry=0x560aebfcd34d "void bdrv_graph_rdlock_main_loop(void)") at assert.c:92
#5 0x00007efc7386ccc6 in __assert_fail (assertion=0x560aebfbf5cf "!qemu_in_coroutine()", file=0x560aebfcd2d4 "../block/graph-lock.c", line=275,
function=0x560aebfcd34d "void bdrv_graph_rdlock_main_loop(void)") at assert.c:101
#6 0x0000560aebcd8dd6 in bdrv_register_buf ()
#7 0x0000560aeb97ed97 in ram_block_added.llvm ()
#8 0x0000560aebb8303f in ram_block_add.llvm ()
#9 0x0000560aebb834fa in qemu_ram_alloc_internal.llvm ()
#10 0x0000560aebb2ac98 in vfio_region_mmap ()
#11 0x0000560aebb3ea0f in vfio_bars_register ()
#12 0x0000560aebb3c628 in vfio_realize ()
#13 0x0000560aeb90f0c2 in pci_qdev_realize ()
#14 0x0000560aebc40305 in device_set_realized ()
#15 0x0000560aebc48e07 in property_set_bool.llvm ()
#16 0x0000560aebc46582 in object_property_set ()
#17 0x0000560aebc4cd58 in object_property_set_qobject ()
#18 0x0000560aebc46ba7 in object_property_set_bool ()
#19 0x0000560aeb98b3ca in qdev_device_add_from_qdict ()
#20 0x0000560aebb1fbaf in virtio_net_set_features ()
#21 0x0000560aebb46b51 in virtio_set_features_nocheck ()
#22 0x0000560aebb47107 in virtio_load ()
#23 0x0000560aeb9ae7ce in vmstate_load_state ()
#24 0x0000560aeb9d2ee9 in qemu_loadvm_state_main ()
#25 0x0000560aeb9d45e1 in qemu_loadvm_state ()
#26 0x0000560aeb9bc32c in process_incoming_migration_co.llvm ()
#27 0x0000560aebeace56 in coroutine_trampoline.llvm ()
Cc: qemu-stable@nongnu.org
Buglink: https://issues.redhat.com/browse/RHEL-832
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Message-ID: <20230905145002.46391-3-kwolf@redhat.com>
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
(cherry picked from commit 92e2e6a867334a990f8d29f07ca34e3162fdd6ec)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
(Mjt: remove coroutine_mixed_fn markings introduced in v7.2.0-909-g0f3de970fe)
diff --git a/hw/virtio/virtio.c b/hw/virtio/virtio.c
index 384c8f0f08..b7da7f074d 100644
--- a/hw/virtio/virtio.c
+++ b/hw/virtio/virtio.c
@@ -3451,6 +3451,39 @@ static int virtio_set_features_nocheck(VirtIODevice *vdev, uint64_t val)
return bad ? -1 : 0;
}
+typedef struct VirtioSetFeaturesNocheckData {
+ Coroutine *co;
+ VirtIODevice *vdev;
+ uint64_t val;
+ int ret;
+} VirtioSetFeaturesNocheckData;
+
+static void virtio_set_features_nocheck_bh(void *opaque)
+{
+ VirtioSetFeaturesNocheckData *data = opaque;
+
+ data->ret = virtio_set_features_nocheck(data->vdev, data->val);
+ aio_co_wake(data->co);
+}
+
+static int
+virtio_set_features_nocheck_maybe_co(VirtIODevice *vdev, uint64_t val)
+{
+ if (qemu_in_coroutine()) {
+ VirtioSetFeaturesNocheckData data = {
+ .co = qemu_coroutine_self(),
+ .vdev = vdev,
+ .val = val,
+ };
+ aio_bh_schedule_oneshot(qemu_get_current_aio_context(),
+ virtio_set_features_nocheck_bh, &data);
+ qemu_coroutine_yield();
+ return data.ret;
+ } else {
+ return virtio_set_features_nocheck(vdev, val);
+ }
+}
+
int virtio_set_features(VirtIODevice *vdev, uint64_t val)
{
int ret;
@@ -3621,14 +3654,14 @@ int virtio_load(VirtIODevice *vdev, QEMUFile *f, int version_id)
* host_features.
*/
uint64_t features64 = vdev->guest_features;
- if (virtio_set_features_nocheck(vdev, features64) < 0) {
+ if (virtio_set_features_nocheck_maybe_co(vdev, features64) < 0) {
error_report("Features 0x%" PRIx64 " unsupported. "
"Allowed features: 0x%" PRIx64,
features64, vdev->host_features);
return -1;
}
} else {
- if (virtio_set_features_nocheck(vdev, features) < 0) {
+ if (virtio_set_features_nocheck_maybe_co(vdev, features) < 0) {
error_report("Features 0x%x unsupported. "
"Allowed features: 0x%" PRIx64,
features, vdev->host_features);
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 53/63] arm64: Restore trapless ptimer access
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 52/63] virtio: Drop out of coroutine context in virtio_load() Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 54/63] hw/char/riscv_htif: Fix printing of console characters on big endian hosts Michael Tokarev
` (9 subsequent siblings)
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel
Cc: qemu-stable, Colton Lewis, Andrew Jones, Richard Henderson,
Peter Maydell, Michael Tokarev
From: Colton Lewis <coltonlewis@google.com>
Due to recent KVM changes, QEMU is setting a ptimer offset resulting
in unintended trap and emulate access and a consequent performance
hit. Filter out the PTIMER_CNT register to restore trapless ptimer
access.
Quoting Andrew Jones:
Simply reading the CNT register and writing back the same value is
enough to set an offset, since the timer will have certainly moved
past whatever value was read by the time it's written. QEMU
frequently saves and restores all registers in the get-reg-list array,
unless they've been explicitly filtered out (with Linux commit
680232a94c12, KVM_REG_ARM_PTIMER_CNT is now in the array). So, to
restore trapless ptimer accesses, we need a QEMU patch to filter out
the register.
See
https://lore.kernel.org/kvmarm/gsntttsonus5.fsf@coltonlewis-kvm.c.googlers.com/T/#m0770023762a821db2a3f0dd0a7dc6aa54e0d0da9
for additional context.
Cc: qemu-stable@nongnu.org
Signed-off-by: Andrew Jones <andrew.jones@linux.dev>
Signed-off-by: Colton Lewis <coltonlewis@google.com>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Colton Lewis <coltonlewis@google.com>
Message-id: 20230831190052.129045-1-coltonlewis@google.com
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
(cherry picked from commit 682814e2a3c883b27f24b9e7cab47313c49acbd4)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
diff --git a/target/arm/kvm64.c b/target/arm/kvm64.c
index 810db33ccb..ed85bcfb5c 100644
--- a/target/arm/kvm64.c
+++ b/target/arm/kvm64.c
@@ -950,6 +950,7 @@ typedef struct CPRegStateLevel {
*/
static const CPRegStateLevel non_runtime_cpregs[] = {
{ KVM_REG_ARM_TIMER_CNT, KVM_PUT_FULL_STATE },
+ { KVM_REG_ARM_PTIMER_CNT, KVM_PUT_FULL_STATE },
};
int kvm_arm_cpreg_level(uint64_t regidx)
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 54/63] hw/char/riscv_htif: Fix printing of console characters on big endian hosts
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 52/63] virtio: Drop out of coroutine context in virtio_load() Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 53/63] arm64: Restore trapless ptimer access Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 55/63] hw/intc: Fix upper/lower mtime write calculation Michael Tokarev
` (8 subsequent siblings)
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel
Cc: qemu-stable, Thomas Huth, Alistair Francis, Bin Meng,
Daniel Henrique Barboza, Philippe Mathieu-Daudé,
Michael Tokarev
From: Thomas Huth <thuth@redhat.com>
The character that should be printed is stored in the 64 bit "payload"
variable. The code currently tries to print it by taking the address
of the variable and passing this pointer to qemu_chr_fe_write(). However,
this only works on little endian hosts where the least significant bits
are stored on the lowest address. To do this in a portable way, we have
to store the value in an uint8_t variable instead.
Fixes: 5033606780 ("RISC-V HTIF Console")
Signed-off-by: Thomas Huth <thuth@redhat.com>
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
Reviewed-by: Bin Meng <bmeng@tinylab.org>
Reviewed-by: Daniel Henrique Barboza <dbarboza@ventanamicro.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Message-Id: <20230721094720.902454-2-thuth@redhat.com>
Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
(cherry picked from commit c255946e3df4d9660e4f468a456633c24393d468)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
(Mjt: edit to compensate for v7.2.0-805-g753ae97abc and v7.2.0-808-gdadee9e3ce)
diff --git a/hw/char/riscv_htif.c b/hw/char/riscv_htif.c
index 6577f0e640..c76d333cfc 100644
--- a/hw/char/riscv_htif.c
+++ b/hw/char/riscv_htif.c
@@ -146,7 +146,8 @@ static void htif_handle_tohost_write(HTIFState *htifstate, uint64_t val_written)
htifstate->env->mtohost = 0; /* clear to indicate we read */
return;
} else if (cmd == 0x1) {
- qemu_chr_fe_write(&htifstate->chr, (uint8_t *)&payload, 1);
+ uint8_t ch = (uint8_t)payload;
+ qemu_chr_fe_write(&htifstate->chr, &ch, 1);
resp = 0x100 | (uint8_t)payload;
} else {
qemu_log("HTIF device %d: unknown command\n", device);
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 55/63] hw/intc: Fix upper/lower mtime write calculation
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
` (2 preceding siblings ...)
2023-09-20 12:15 ` [Stable-7.2.6 54/63] hw/char/riscv_htif: Fix printing of console characters on big endian hosts Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 56/63] hw/intc: Make rtc variable names consistent Michael Tokarev
` (7 subsequent siblings)
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel; +Cc: qemu-stable, Jason Chien, Alistair Francis, Michael Tokarev
From: Jason Chien <jason.chien@sifive.com>
When writing the upper mtime, we should keep the original lower mtime
whose value is given by cpu_riscv_read_rtc() instead of
cpu_riscv_read_rtc_raw(). The same logic applies to writes to lower mtime.
Signed-off-by: Jason Chien <jason.chien@sifive.com>
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
Message-ID: <20230728082502.26439-1-jason.chien@sifive.com>
Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
(cherry picked from commit e0922b73baf00c4c19d4ad30d09bb94f7ffea0f4)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
diff --git a/hw/intc/riscv_aclint.c b/hw/intc/riscv_aclint.c
index eee04643cb..e71d6396d9 100644
--- a/hw/intc/riscv_aclint.c
+++ b/hw/intc/riscv_aclint.c
@@ -208,11 +208,12 @@ static void riscv_aclint_mtimer_write(void *opaque, hwaddr addr,
return;
} else if (addr == mtimer->time_base || addr == mtimer->time_base + 4) {
uint64_t rtc_r = cpu_riscv_read_rtc_raw(mtimer->timebase_freq);
+ uint64_t rtc = cpu_riscv_read_rtc(mtimer);
if (addr == mtimer->time_base) {
if (size == 4) {
/* time_lo for RV32/RV64 */
- mtimer->time_delta = ((rtc_r & ~0xFFFFFFFFULL) | value) - rtc_r;
+ mtimer->time_delta = ((rtc & ~0xFFFFFFFFULL) | value) - rtc_r;
} else {
/* time for RV64 */
mtimer->time_delta = value - rtc_r;
@@ -220,7 +221,7 @@ static void riscv_aclint_mtimer_write(void *opaque, hwaddr addr,
} else {
if (size == 4) {
/* time_hi for RV32/RV64 */
- mtimer->time_delta = (value << 32 | (rtc_r & 0xFFFFFFFF)) - rtc_r;
+ mtimer->time_delta = (value << 32 | (rtc & 0xFFFFFFFF)) - rtc_r;
} else {
qemu_log_mask(LOG_GUEST_ERROR,
"aclint-mtimer: invalid time_hi write: %08x",
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 56/63] hw/intc: Make rtc variable names consistent
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
` (3 preceding siblings ...)
2023-09-20 12:15 ` [Stable-7.2.6 55/63] hw/intc: Fix upper/lower mtime write calculation Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 57/63] linux-user/riscv: Use abi type for target_ucontext Michael Tokarev
` (6 subsequent siblings)
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel; +Cc: qemu-stable, Jason Chien, Alistair Francis, Michael Tokarev
From: Jason Chien <jason.chien@sifive.com>
The variables whose values are given by cpu_riscv_read_rtc() should be named
"rtc". The variables whose value are given by cpu_riscv_read_rtc_raw()
should be named "rtc_r".
Signed-off-by: Jason Chien <jason.chien@sifive.com>
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
Message-ID: <20230728082502.26439-2-jason.chien@sifive.com>
Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
(cherry picked from commit 9382a9eafccad8dc6a487ea3a8d2bed03dc35db9)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
diff --git a/hw/intc/riscv_aclint.c b/hw/intc/riscv_aclint.c
index e71d6396d9..908edcbb80 100644
--- a/hw/intc/riscv_aclint.c
+++ b/hw/intc/riscv_aclint.c
@@ -64,13 +64,13 @@ static void riscv_aclint_mtimer_write_timecmp(RISCVAclintMTimerState *mtimer,
uint64_t next;
uint64_t diff;
- uint64_t rtc_r = cpu_riscv_read_rtc(mtimer);
+ uint64_t rtc = cpu_riscv_read_rtc(mtimer);
/* Compute the relative hartid w.r.t the socket */
hartid = hartid - mtimer->hartid_base;
mtimer->timecmp[hartid] = value;
- if (mtimer->timecmp[hartid] <= rtc_r) {
+ if (mtimer->timecmp[hartid] <= rtc) {
/*
* If we're setting an MTIMECMP value in the "past",
* immediately raise the timer interrupt
@@ -81,7 +81,7 @@ static void riscv_aclint_mtimer_write_timecmp(RISCVAclintMTimerState *mtimer,
/* otherwise, set up the future timer interrupt */
qemu_irq_lower(mtimer->timer_irqs[hartid]);
- diff = mtimer->timecmp[hartid] - rtc_r;
+ diff = mtimer->timecmp[hartid] - rtc;
/* back to ns (note args switched in muldiv64) */
uint64_t ns_diff = muldiv64(diff, NANOSECONDS_PER_SECOND, timebase_freq);
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 57/63] linux-user/riscv: Use abi type for target_ucontext
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
` (4 preceding siblings ...)
2023-09-20 12:15 ` [Stable-7.2.6 56/63] hw/intc: Make rtc variable names consistent Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 58/63] hw/riscv: virt: Fix riscv,pmu DT node path Michael Tokarev
` (5 subsequent siblings)
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel
Cc: qemu-stable, LIU Zhiwei, Richard Henderson,
Daniel Henrique Barboza, Philippe Mathieu-Daudé,
Alistair Francis, Michael Tokarev
From: LIU Zhiwei <zhiwei_liu@linux.alibaba.com>
We should not use types dependend on host arch for target_ucontext.
This bug is found when run rv32 applications.
Signed-off-by: LIU Zhiwei <zhiwei_liu@linux.alibaba.com>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Reviewed-by: Daniel Henrique Barboza <dbarboza@ventanamicro.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Message-ID: <20230811055438.1945-1-zhiwei_liu@linux.alibaba.com>
Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
(cherry picked from commit ae7d4d625cab49657b9fc2be09d895afb9bcdaf0)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
diff --git a/linux-user/riscv/signal.c b/linux-user/riscv/signal.c
index eaa168199a..f989f7f51f 100644
--- a/linux-user/riscv/signal.c
+++ b/linux-user/riscv/signal.c
@@ -38,8 +38,8 @@ struct target_sigcontext {
}; /* cf. riscv-linux:arch/riscv/include/uapi/asm/ptrace.h */
struct target_ucontext {
- unsigned long uc_flags;
- struct target_ucontext *uc_link;
+ abi_ulong uc_flags;
+ abi_ptr uc_link;
target_stack_t uc_stack;
target_sigset_t uc_sigmask;
uint8_t __unused[1024 / 8 - sizeof(target_sigset_t)];
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 58/63] hw/riscv: virt: Fix riscv,pmu DT node path
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
` (5 preceding siblings ...)
2023-09-20 12:15 ` [Stable-7.2.6 57/63] linux-user/riscv: Use abi type for target_ucontext Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 59/63] target/riscv/pmp.c: respect mseccfg.RLB for pmpaddrX changes Michael Tokarev
` (4 subsequent siblings)
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel
Cc: qemu-stable, Conor Dooley, Alistair Francis,
Daniel Henrique Barboza, Michael Tokarev
From: Conor Dooley <conor.dooley@microchip.com>
On a dtb dumped from the virt machine, dt-validate complains:
soc: pmu: {'riscv,event-to-mhpmcounters': [[1, 1, 524281], [2, 2, 524284], [65561, 65561, 524280], [65563, 65563, 524280], [65569, 65569, 524280]], 'compatible': ['riscv,pmu']} should not be valid under {'type': 'object'}
from schema $id: http://devicetree.org/schemas/simple-bus.yaml#
That's pretty cryptic, but running the dtb back through dtc produces
something a lot more reasonable:
Warning (simple_bus_reg): /soc/pmu: missing or empty reg/ranges property
Moving the riscv,pmu node out of the soc bus solves the problem.
Signed-off-by: Conor Dooley <conor.dooley@microchip.com>
Acked-by: Alistair Francis <alistair.francis@wdc.com>
Reviewed-by: Daniel Henrique Barboza <dbarboza@ventanamicro.com>
Message-ID: <20230727-groom-decline-2c57ce42841c@spud>
Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
(cherry picked from commit 9ff31406312500053ecb5f92df01dd9ce52e635d)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
(Mjt: context adjustment due to 568e0614d09 "hw/riscv/virt.c: rename MachineState 'mc' pointers to 'ms'")
diff --git a/hw/riscv/virt.c b/hw/riscv/virt.c
index a5bc7353b4..3a99b4b801 100644
--- a/hw/riscv/virt.c
+++ b/hw/riscv/virt.c
@@ -715,7 +715,7 @@ static void create_fdt_pmu(RISCVVirtState *s)
MachineState *mc = MACHINE(s);
RISCVCPU hart = s->soc[0].harts[0];
- pmu_name = g_strdup_printf("/soc/pmu");
+ pmu_name = g_strdup_printf("/pmu");
qemu_fdt_add_subnode(mc->fdt, pmu_name);
qemu_fdt_setprop_string(mc->fdt, pmu_name, "compatible", "riscv,pmu");
riscv_pmu_generate_fdt_node(mc->fdt, hart.cfg.pmu_num, pmu_name);
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 59/63] target/riscv/pmp.c: respect mseccfg.RLB for pmpaddrX changes
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
` (6 preceding siblings ...)
2023-09-20 12:15 ` [Stable-7.2.6 58/63] hw/riscv: virt: Fix riscv,pmu DT node path Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 60/63] hw/tpm: TIS on sysbus: Remove unsupport ppi command line option Michael Tokarev
` (3 subsequent siblings)
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel
Cc: qemu-stable, Leon Schuermann, Mayuresh Chitale, Alistair Francis,
Michael Tokarev
From: Leon Schuermann <leons@opentitan.org>
When the rule-lock bypass (RLB) bit is set in the mseccfg CSR, the PMP
configuration lock bits must not apply. While this behavior is
implemented for the pmpcfgX CSRs, this bit is not respected for
changes to the pmpaddrX CSRs. This patch ensures that pmpaddrX CSR
writes work even on locked regions when the global rule-lock bypass is
enabled.
Signed-off-by: Leon Schuermann <leons@opentitan.org>
Reviewed-by: Mayuresh Chitale <mchitale@ventanamicro.com>
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
Message-ID: <20230829215046.1430463-1-leon@is.currently.online>
Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
(cherry picked from commit 4e3adce1244e1ca30ec05874c3eca14911dc0825)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
diff --git a/target/riscv/pmp.c b/target/riscv/pmp.c
index 2b43e399b8..575cea1b28 100644
--- a/target/riscv/pmp.c
+++ b/target/riscv/pmp.c
@@ -45,6 +45,10 @@ static inline uint8_t pmp_get_a_field(uint8_t cfg)
*/
static inline int pmp_is_locked(CPURISCVState *env, uint32_t pmp_index)
{
+ /* mseccfg.RLB is set */
+ if (MSECCFG_RLB_ISSET(env)) {
+ return 0;
+ }
if (env->pmp_state.pmp[pmp_index].cfg_reg & PMP_LOCK) {
return 1;
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 60/63] hw/tpm: TIS on sysbus: Remove unsupport ppi command line option
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
` (7 preceding siblings ...)
2023-09-20 12:15 ` [Stable-7.2.6 59/63] target/riscv/pmp.c: respect mseccfg.RLB for pmpaddrX changes Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 61/63] ui: fix crash when there are no active_console Michael Tokarev
` (2 subsequent siblings)
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel; +Cc: qemu-stable, Stefan Berger, Eric Auger, Michael Tokarev
From: Stefan Berger <stefanb@linux.ibm.com>
The ppi command line option for the TIS device on sysbus never worked
and caused an immediate segfault. Remove support for it since it also
needs support in the firmware and needs testing inside the VM.
Reproducer with the ppi=on option passed:
qemu-system-aarch64 \
-machine virt,gic-version=3 \
-m 4G \
-nographic -no-acpi \
-chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
-tpmdev emulator,id=tpm0,chardev=chrtpm \
-device tpm-tis-device,tpmdev=tpm0,ppi=on
[...]
Segmentation fault (core dumped)
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Reviewed-by: Eric Auger <eric.auger@redhat.com>
Message-id: 20230713171955.149236-1-stefanb@linux.ibm.com
(cherry picked from commit 4c46fe2ed492f35f411632c8b5a8442f322bc3f0)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
diff --git a/hw/tpm/tpm_tis_sysbus.c b/hw/tpm/tpm_tis_sysbus.c
index 45e63efd63..6724b3d4f6 100644
--- a/hw/tpm/tpm_tis_sysbus.c
+++ b/hw/tpm/tpm_tis_sysbus.c
@@ -93,7 +93,6 @@ static void tpm_tis_sysbus_reset(DeviceState *dev)
static Property tpm_tis_sysbus_properties[] = {
DEFINE_PROP_UINT32("irq", TPMStateSysBus, state.irq_num, TPM_TIS_IRQ),
DEFINE_PROP_TPMBE("tpmdev", TPMStateSysBus, state.be_driver),
- DEFINE_PROP_BOOL("ppi", TPMStateSysBus, state.ppi_enabled, false),
DEFINE_PROP_END_OF_LIST(),
};
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 61/63] ui: fix crash when there are no active_console
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
` (8 preceding siblings ...)
2023-09-20 12:15 ` [Stable-7.2.6 60/63] hw/tpm: TIS on sysbus: Remove unsupport ppi command line option Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 62/63] s390x/ap: fix missing subsystem reset registration Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 63/63] tpm: fix crash when FD >= 1024 and unnecessary errors due to EINTR Michael Tokarev
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel
Cc: qemu-stable, Marc-André Lureau, Albert Esteve,
Michael Tokarev
From: Marc-André Lureau <marcandre.lureau@redhat.com>
Thread 1 "qemu-system-x86" received signal SIGSEGV, Segmentation fault.
0x0000555555888630 in dpy_ui_info_supported (con=0x0) at ../ui/console.c:812
812 return con->hw_ops->ui_info != NULL;
(gdb) bt
#0 0x0000555555888630 in dpy_ui_info_supported (con=0x0) at ../ui/console.c:812
#1 0x00005555558a44b1 in protocol_client_msg (vs=0x5555578c76c0, data=0x5555581e93f0 <incomplete sequence \373>, len=24) at ../ui/vnc.c:2585
#2 0x00005555558a19ac in vnc_client_read (vs=0x5555578c76c0) at ../ui/vnc.c:1607
#3 0x00005555558a1ac2 in vnc_client_io (ioc=0x5555581eb0e0, condition=G_IO_IN, opaque=0x5555578c76c0) at ../ui/vnc.c:1635
Fixes:
https://issues.redhat.com/browse/RHEL-2600
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Reviewed-by: Albert Esteve <aesteve@redhat.com>
(cherry picked from commit 48a35e12faf90a896c5aa4755812201e00d60316)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
diff --git a/ui/console.c b/ui/console.c
index 646202214a..52414d6aa3 100644
--- a/ui/console.c
+++ b/ui/console.c
@@ -1697,6 +1697,9 @@ bool dpy_ui_info_supported(QemuConsole *con)
if (con == NULL) {
con = active_console;
}
+ if (con == NULL) {
+ return false;
+ }
return con->hw_ops->ui_info != NULL;
}
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 62/63] s390x/ap: fix missing subsystem reset registration
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
` (9 preceding siblings ...)
2023-09-20 12:15 ` [Stable-7.2.6 61/63] ui: fix crash when there are no active_console Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 63/63] tpm: fix crash when FD >= 1024 and unnecessary errors due to EINTR Michael Tokarev
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel
Cc: qemu-stable, Janosch Frank, Jason J . Herne, Tony Krowiak,
Thomas Huth, Michael Tokarev
From: Janosch Frank <frankja@linux.ibm.com>
A subsystem reset contains a reset of AP resources which has been
missing. Adding the AP bridge to the list of device types that need
reset fixes this issue.
Reviewed-by: Jason J. Herne <jjherne@linux.ibm.com>
Reviewed-by: Tony Krowiak <akrowiak@linux.ibm.com>
Signed-off-by: Janosch Frank <frankja@linux.ibm.com>
Fixes: a51b3153 ("s390x/ap: base Adjunct Processor (AP) object model")
Message-ID: <20230823142219.1046522-2-seiden@linux.ibm.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
(cherry picked from commit 297ec01f0b9864ea8209ca0ddc6643b4c0574bdb)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
diff --git a/hw/s390x/s390-virtio-ccw.c b/hw/s390x/s390-virtio-ccw.c
index 2e64ffab45..16899a1814 100644
--- a/hw/s390x/s390-virtio-ccw.c
+++ b/hw/s390x/s390-virtio-ccw.c
@@ -108,6 +108,7 @@ static const char *const reset_dev_types[] = {
"s390-flic",
"diag288",
TYPE_S390_PCI_HOST_BRIDGE,
+ TYPE_AP_BRIDGE,
};
static void subsystem_reset(void)
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
* [Stable-7.2.6 63/63] tpm: fix crash when FD >= 1024 and unnecessary errors due to EINTR
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
` (10 preceding siblings ...)
2023-09-20 12:15 ` [Stable-7.2.6 62/63] s390x/ap: fix missing subsystem reset registration Michael Tokarev
@ 2023-09-20 12:15 ` Michael Tokarev
11 siblings, 0 replies; 13+ messages in thread
From: Michael Tokarev @ 2023-09-20 12:15 UTC (permalink / raw)
To: qemu-devel
Cc: qemu-stable, Marc-André Lureau, Michael Tokarev,
Stefan Berger
From: Marc-André Lureau <marcandre.lureau@redhat.com>
Replace select() with poll() to fix a crash when QEMU has a large number
of FDs. Also use RETRY_ON_EINTR to avoid unnecessary errors due to EINTR.
Cc: qemu-stable@nongnu.org
Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=2020133
Fixes: 56a3c24ffc ("tpm: Probe for connected TPM 1.2 or TPM 2")
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Reviewed-by: Michael Tokarev <mjt@tls.msk.ru>
Reviewed-by: Stefan Berger <stefanb@linux.ibm.com>
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
(cherry picked from commit 8e32ddff69b6b4547cc00592ad816484e160817a)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
(Mjt: use TFR() instead of RETRY_ON_EINTR() before v7.2.0-538-g8b6aa69365)
diff --git a/backends/tpm/tpm_util.c b/backends/tpm/tpm_util.c
index a6e6d3e72f..a9d6f7a1c4 100644
--- a/backends/tpm/tpm_util.c
+++ b/backends/tpm/tpm_util.c
@@ -112,12 +112,8 @@ static int tpm_util_request(int fd,
void *response,
size_t responselen)
{
- fd_set readfds;
+ GPollFD fds[1] = { {.fd = fd, .events = G_IO_IN } };
int n;
- struct timeval tv = {
- .tv_sec = 1,
- .tv_usec = 0,
- };
n = write(fd, request, requestlen);
if (n < 0) {
@@ -127,11 +123,8 @@ static int tpm_util_request(int fd,
return -EFAULT;
}
- FD_ZERO(&readfds);
- FD_SET(fd, &readfds);
-
/* wait for a second */
- n = select(fd + 1, &readfds, NULL, NULL, &tv);
+ TFR(n = g_poll(fds, 1, 1000));
if (n != 1) {
return -errno;
}
--
2.39.2
^ permalink raw reply related [flat|nested] 13+ messages in thread
end of thread, other threads:[~2023-09-20 12:18 UTC | newest]
Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-09-20 12:15 [Stable-7.2.6 00/63] v3 Patch Round-up for stable 7.2.6, freeze on 2023-09-19 Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 52/63] virtio: Drop out of coroutine context in virtio_load() Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 53/63] arm64: Restore trapless ptimer access Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 54/63] hw/char/riscv_htif: Fix printing of console characters on big endian hosts Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 55/63] hw/intc: Fix upper/lower mtime write calculation Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 56/63] hw/intc: Make rtc variable names consistent Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 57/63] linux-user/riscv: Use abi type for target_ucontext Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 58/63] hw/riscv: virt: Fix riscv,pmu DT node path Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 59/63] target/riscv/pmp.c: respect mseccfg.RLB for pmpaddrX changes Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 60/63] hw/tpm: TIS on sysbus: Remove unsupport ppi command line option Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 61/63] ui: fix crash when there are no active_console Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 62/63] s390x/ap: fix missing subsystem reset registration Michael Tokarev
2023-09-20 12:15 ` [Stable-7.2.6 63/63] tpm: fix crash when FD >= 1024 and unnecessary errors due to EINTR Michael Tokarev
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).